IOC Report
DownloadDirectorLauncher.zip

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding

Memdumps

Base Address
Regiontype
Protect
Malicious
1E8FD1E0000
heap
page read and write
1E8FD2A8000
heap
page read and write
94539DE000
stack
page read and write
1E8FD225000
heap
page read and write
1E8FECD0000
heap
page read and write
1E8FD220000
heap
page read and write
94538DC000
stack
page read and write
945395E000
stack
page read and write
9453C7F000
stack
page read and write
1E8FD0E0000
heap
page read and write
1E8FD2A0000
heap
page read and write
1E8FD1C0000
heap
page read and write
There are 2 hidden memdumps, click here to show them.